<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Authentication checking multiple policies Cisco ISE in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/authentication-checking-multiple-policies-cisco-ise/m-p/4531708#M572210</link>
    <description>&lt;P&gt;Hello Team,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've trying to configure the authentication of users checking multiple policies on the 'Policy Sets' but no success, I mean, I want to know if the ISE is able to follow the next flow:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;USER&lt;/STRONG&gt; -&amp;gt; &lt;STRONG&gt;Policy 1&lt;/STRONG&gt; - NOT FOUND -&amp;gt; &lt;STRONG&gt;Policy 2&lt;/STRONG&gt; - NOT FOUND -&amp;gt; &lt;STRONG&gt;Policy 3&lt;/STRONG&gt; - NOT FOUND -&amp;gt; &lt;STRONG&gt;Policy 4&lt;/STRONG&gt; FOUND!! Access granted!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
    <pubDate>Fri, 14 Jan 2022 17:22:28 GMT</pubDate>
    <dc:creator>iVicMMac</dc:creator>
    <dc:date>2022-01-14T17:22:28Z</dc:date>
    <item>
      <title>Authentication checking multiple policies Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-checking-multiple-policies-cisco-ise/m-p/4531708#M572210</link>
      <description>&lt;P&gt;Hello Team,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've trying to configure the authentication of users checking multiple policies on the 'Policy Sets' but no success, I mean, I want to know if the ISE is able to follow the next flow:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;USER&lt;/STRONG&gt; -&amp;gt; &lt;STRONG&gt;Policy 1&lt;/STRONG&gt; - NOT FOUND -&amp;gt; &lt;STRONG&gt;Policy 2&lt;/STRONG&gt; - NOT FOUND -&amp;gt; &lt;STRONG&gt;Policy 3&lt;/STRONG&gt; - NOT FOUND -&amp;gt; &lt;STRONG&gt;Policy 4&lt;/STRONG&gt; FOUND!! Access granted!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Fri, 14 Jan 2022 17:22:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-checking-multiple-policies-cisco-ise/m-p/4531708#M572210</guid>
      <dc:creator>iVicMMac</dc:creator>
      <dc:date>2022-01-14T17:22:28Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication checking multiple policies Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-checking-multiple-policies-cisco-ise/m-p/4531712#M572212</link>
      <description>&lt;P&gt;Use an Identity Source Sequence to accomplish this.&lt;/P&gt;</description>
      <pubDate>Fri, 14 Jan 2022 17:33:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-checking-multiple-policies-cisco-ise/m-p/4531712#M572212</guid>
      <dc:creator>ericsmi</dc:creator>
      <dc:date>2022-01-14T17:33:41Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication checking multiple policies Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-checking-multiple-policies-cisco-ise/m-p/4531789#M572218</link>
      <description>&lt;P&gt;I think in my design its not possible to implement through this feature, is there any alternative?&lt;/P&gt;</description>
      <pubDate>Fri, 14 Jan 2022 19:26:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-checking-multiple-policies-cisco-ise/m-p/4531789#M572218</guid>
      <dc:creator>iVicMMac</dc:creator>
      <dc:date>2022-01-14T19:26:25Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication checking multiple policies Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-checking-multiple-policies-cisco-ise/m-p/4532118#M572236</link>
      <description>&lt;P&gt;Are you using multiple Policy Sets or only the Default Policy Set?&lt;/P&gt;
&lt;P&gt;The &lt;STRONG&gt;ISE LiveLog Details&lt;/STRONG&gt; will show you what identity store it tried to authenticate against and what it matched for the Authorization Rule (Policy Set &amp;gt; Authorization Rule). The LiveLog&amp;nbsp; will show you the Authorization Profile it assigned from your Authz Rule, too.&lt;/P&gt;
&lt;P&gt;I just did an&amp;nbsp;ISE for the Zero Trust Workplace webinar last week and performed a demo of an authentication and showed how you can see the matching policy in the LiveLog.&amp;nbsp; It will be posted to our &lt;STRONG&gt;&lt;A href="https://cs.co/ise-videos" target="_self"&gt;CiscoISE YouTube Channel&lt;/A&gt;&lt;/STRONG&gt; this next week.&lt;/P&gt;</description>
      <pubDate>Sun, 16 Jan 2022 01:16:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-checking-multiple-policies-cisco-ise/m-p/4532118#M572236</guid>
      <dc:creator>thomas</dc:creator>
      <dc:date>2022-01-16T01:16:33Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication checking multiple policies Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-checking-multiple-policies-cisco-ise/m-p/4532679#M572261</link>
      <description>&lt;P&gt;Hi Thomas,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yeah, Im using multiple policy sets in my ocnfiguration, basically the problem is, there is a implicit Deny on each policy, this avoid to check the next policy, so, when I try to log in whtn the user 3(which is under policy 3) the ISE only checks the Policy 1, therefore the access is denied, because the user does not exist in policy 1&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jan 2022 14:53:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-checking-multiple-policies-cisco-ise/m-p/4532679#M572261</guid>
      <dc:creator>iVicMMac</dc:creator>
      <dc:date>2022-01-17T14:53:09Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication checking multiple policies Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-checking-multiple-policies-cisco-ise/m-p/4532927#M572266</link>
      <description>&lt;P&gt;When a session matches the conditions for a Policy Set, it will be evaluated only by the AuthC and AuthZ Policies within that Policy Set. There is no 'implicit deny' on the AuthC/AuthZ Policies. You can configure either a Permit (ACCESS_ACCEPT) or Deny (ACCESS_REJECT) for the Default AuthC/AuthZ Policies within a Policy Set, but the session will never continue past that Default AuthC/AuthZ policy. The ISE policy flow cannot be configured such that one Policy Set is evaluated and if no match, continue to a different Policy Set.&lt;/P&gt;
&lt;P&gt;You will need to re-evaluate what you are trying to accomplish and look at possibly collapsing your Policy Sets and maybe using some sort of Identity Source Sequence.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jan 2022 21:46:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-checking-multiple-policies-cisco-ise/m-p/4532927#M572266</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2022-01-17T21:46:07Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication checking multiple policies Cisco ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/authentication-checking-multiple-policies-cisco-ise/m-p/4532962#M572268</link>
      <description>&lt;P&gt;thank you&lt;/P&gt;</description>
      <pubDate>Mon, 17 Jan 2022 23:57:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/authentication-checking-multiple-policies-cisco-ise/m-p/4532962#M572268</guid>
      <dc:creator>iVicMMac</dc:creator>
      <dc:date>2022-01-17T23:57:02Z</dc:date>
    </item>
  </channel>
</rss>

